The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of JDOM: two vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of JDOM.
Vulnerable products: JDOM.
Severity of this weakness: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 18/02/2015.
Références of this bulletin: VIGILANCE-VUL-16212.

Description of the vulnerability 

Several vulnerabilities were announced in JDOM.

An unknown vulnerability was announced in the generation of output strings of the test suite. This vulnerability is not confirmed. [severity:1/4]

An unknown vulnerability was announced in the root file path processing of JDOMBean.java. [severity:2/4]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity vulnerability impacts software or systems such as JDOM.

Our Vigil@nce team determined that the severity of this vulnerability is medium.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this weakness alert.

Solutions for this threat 

JDOM: version 2.0.6.
The version 2.0.6 is fixed:
  http://www.jdom.org/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability alert. The Vigil@nce vulnerability database contains several thousand vulnerabilities.